Skip to content

K8s: restructure REC cert page for clarity#3325

Merged
kaitlynmichael merged 3 commits into
mainfrom
DOC-6572
May 20, 2026
Merged

K8s: restructure REC cert page for clarity#3325
kaitlynmichael merged 3 commits into
mainfrom
DOC-6572

Conversation

@kaitlynmichael
Copy link
Copy Markdown
Contributor

@kaitlynmichael kaitlynmichael commented May 14, 2026

Note

Low Risk
Documentation-only restructure that changes guidance and examples but no runtime code; risk is limited to potential confusion if instructions are inaccurate.

Overview
Clarifies REC certificate replacement by reframing the page around two explicit workflows: operator-managed rotation via spec.certificates (recommended) vs direct Redis Software REST API/rladmin updates (with a warning about operator overwrites).

Expands the operator-managed path with a supported-certificate mapping table, updated YAML example (adds LDAP/SSO fields), secret creation details (accepted key names, kubernetes.io/tls compatibility, and a pre-8.0.18 note), and an explicit rotation verification step via GET /v1/cluster/certificates.

Reviewed by Cursor Bugbot for commit f2ae47b. Bugbot is set up for automated code reviews on this repo. Configure here.

@kaitlynmichael kaitlynmichael requested review from a team, heinrich-redislabs and zcahana May 14, 2026 19:15
@kaitlynmichael kaitlynmichael self-assigned this May 14, 2026
@kaitlynmichael kaitlynmichael added bug Something isn't working k8s labels May 14, 2026
@github-actions
Copy link
Copy Markdown
Contributor

github-actions Bot commented May 14, 2026

DOC-6572

@github-actions
Copy link
Copy Markdown
Contributor

@jit-ci
Copy link
Copy Markdown

jit-ci Bot commented May 14, 2026

🛡️ Jit Security Scan Results

CRITICAL HIGH MEDIUM

✅ No security findings were detected in this PR


Security scan by Jit

Copy link
Copy Markdown
Collaborator

@dwdougherty dwdougherty left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Language LGTM.

Comment thread content/operate/kubernetes/security/manage-rec-certificates.md Outdated
Comment thread content/operate/kubernetes/security/manage-rec-certificates.md Outdated
Comment thread content/operate/kubernetes/security/manage-rec-certificates.md Outdated
Comment thread content/operate/kubernetes/security/manage-rec-certificates.md Outdated
Comment thread content/operate/kubernetes/security/manage-rec-certificates.md Outdated

Rotating any of these certificates does not restart REC pods.

### Step 1: Create a secret for the certificate
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We now support several possible secret key names to specify the cert/privatekey. This is mentioned in the API reference, but could be useful in here too.

The supported keys ~are:

  • Certificate: certificate, cert, or tls.crt
  • Private key: key or tls.key

tls.crt and tls.key are the ones used with TLS-type secrets - as created by cert-manager.
certificate, cert and key are the ones we previously supported.
I believe we now support any of these, with any of the certificate secrets (@heinrich-redislabs can you please confirm this too?).

Aside from that, there's the (now optional) name key.

Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes that is correct.
The API docs clearly indicates for every secret which field names are supported.

@kaitlynmichael kaitlynmichael requested a review from zcahana May 19, 2026 15:57
--from-file=key=</PATH/TO/key.pem> \
--from-literal=name=<proxy | api | cm | syncer | metrics_exporter | cp_internode_encryption | dp_internode_encryption>
```
This is the Kubernetes-native method. The operator detects changes to a referenced secret and rotates the certificate without manual intervention. You can create the secret manually with `kubectl`, or have [cert-manager]({{< relref "/operate/kubernetes/security/cert-manager" >}}) issue and renew it automatically.
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Some users use lubectl others oc, depending on the platform. I would rephrase it as:

You can create the secrete manually, or have ...

Comment on lines +61 to +64
| Field | Accepted secret keys |
| ----------- | ------------------------------------- |
| Certificate | `cert`, `certificate`, or `tls.crt` |
| Private key | `key` or `tls.key` |
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This one is correct.

Copy link
Copy Markdown

@heinrich-redislabs heinrich-redislabs left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added some comments, but looks good overall.

Copy link
Copy Markdown
Contributor

@zcahana zcahana left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, thanks @kaitlynmichael!

@kaitlynmichael kaitlynmichael merged commit 7fc418d into main May 20, 2026
65 checks passed
@kaitlynmichael kaitlynmichael deleted the DOC-6572 branch May 20, 2026 19:54
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

bug Something isn't working k8s

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants